Search Results - (( some application mining algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- application mining »
- some application »
- mining algorithm »
- java application »
-
1
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
2
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
-
6
An association rule mining approach in predicting flood areas
Published 2017“…This study focuses on the application of Association rules mining for the flood data in Terengganu. …”
Get full text
Get full text
Conference or Workshop Item -
7
Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System
Published 2017“…Further research can provide newer algorithm to handle cold start problem and sparse data from both text mining and mining computation perspectives.…”
Get full text
Get full text
Get full text
Article -
8
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
Get full text
Get full text
Research Reports -
9
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
An Association Rule Mining Approach in Predicting Flood Areas
Published 2016“…This study focuses on the application of Association rules mining for the flood data in Terengganu. …”
Get full text
Get full text
Get full text
Book Section -
12
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…There has been a rapid growth in using Artificial Immune Systems for applications in data mining and computational intelligence recently. …”
Get full text
Get full text
Thesis -
13
-
14
Intelligent mining of large-scale bio-data: bioinformatics applications
Published 2017“…It also highlights some future perspectives of data mining in bioinformatics that can inspire further developments of data mining instruments. …”
Get full text
Get full text
Get full text
Article -
15
Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance
Published 2019“…However, it requires a large amount of cost to be invested in maintenance. Last but not least, some of the complex data mining tasks are not able to perform because of the limited algorithms and machine learning in Orange software.…”
Get full text
Get full text
Monograph -
16
Modeling Teacher's Integrity Using Data Mining
Published 2010Get full text
Get full text
Get full text
Get full text
Thesis -
17
Development of a new algorithm for segmentation of flotation froth images
Published 2014Get full text
Get full text
Article -
18
-
19
Context aware app recommendation using email semantic analysis
Published 2019“…The recommendation system is planned to develop by using data mining and machine learning. The email content as the raw data and sent to the test mining to perform text classification and category the data into differen t categories. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis
